IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security Reports
Understanding the Dynamics of Virtualization Security
sponsored by BitDefender
EGUIDE: This expert guide analyzes the complexities of virtualization security and explains how you can successfully secure your virtual environments.
Posted: 24 Nov 2015 | Published: 24 Nov 2015


Special Report: Healthcare Security in 2015
sponsored by Raytheon|Websense
WHITE PAPER: This report examines the issues and challenges surrounding IT security in the healthcare industry and gives advice on overcoming them.
Posted: 17 Nov 2015 | Published: 22 Sep 2015


Unknown Malware - What You Can't See Can Hurt You
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic provides some essential statistics on the rise of unknown malware and gives advice for defeating it. Discover how you can fight the unknown and keep your organization secure.
Posted: 17 Nov 2015 | Published: 31 Dec 2014

Check Point Software Technologies Ltd.

Introduction to the Top Database Security Tools
sponsored by Oracle Corporation
EGUIDE: This expert guide provides detailed information on the most important database security tools and top vendors that you should know about.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Oracle Corporation

Security Intelligence: Solving the Puzzle for Actionable Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper discusses why security intelligence is key to developing a modern approach to cybersecurity and explains how you can implement security intelligence in your environment.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

LogRhythm, Inc.

Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation

Security Intelligence for the Modern Data Center
sponsored by AccelOps Inc.
WHITE PAPER: Organizations need an intelligent approach to understand data and proactively detect security threats and anomalies. In this white paper, learn how to consolidate security, performance, and compliance monitoring into a single pane of glass to improve protection across environments
Posted: 17 Nov 2015 | Published: 03 Nov 2015

AccelOps Inc.

The Cyber Security Balancing Act: Improving WAF Accuracy Without Impacting Legitimate Users
sponsored by Akamai
WHITE PAPER: Access this white paper to explore the challenges of improving WAF accuracy. Examine the benefits of a single measure for evaluating WAF efficacy and reducing the percentage of false positives that adversely affect legitimate users.
Posted: 05 Nov 2015 | Published: 30 Sep 2015


Encrypted Network Security Solutions - Infographic
sponsored by Unisys
RESOURCE: Learn about an innovative approach to securing your network in this infographic.
Posted: 18 Nov 2015 | Published: 04 Nov 2015


How to Deliver Value, Not Risk, With Your Organization's Mobile Apps
sponsored by IBM
WEBCAST: To insulate your organization from modern security threats and earn the trust of your customers, this webcast explains, you need to bolster your apps against threats from all sides. View now to learn how one platform can address your mobile app security challenges.
Posted: 06 Nov 2015 | Premiered: Sep 2, 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement